Cyber Security and Insider Threat.
|
|
|
- Reynard McDowell
- 10 years ago
- Views:
Transcription
1 CONFERENCE AGENDA FEBRUARY 18 19, 2015 OTTAWA EFFECTIVE STRATEGIES FOR DEFENDING YOUR DATA AND ORGANIZATION Cyber Security and Insider Threat. Kristin Lovejoy General Manager, IBM Canada Ltd. Cheri F. McGuire Vice-President, Global Government Affairs and Cybersecurity Policy, Symantec Corporation Dr. James L. Norrie Dean, Business and Justice Studies, Utica College #CBoCSecurity
2 Learn about the Conference Board s new Centre on Cyber Security This event will mark the launch of a new Centre at the Board dedicated to cyber security. You will be the first to hear about it s proposed activities and research agenda and have an opportunity to share your own priorities and areas of concern. Gain insights from the experts on insider threat from the technical and social perspective. Take advantage of expert presentation and networking to develop a greater appreciation of today s threat environment and the role of insider threats. Topics for discussion will include how to: understand the range of threats in today s environment identify those employees who might pose a risk of becoming a threat avoid accidental release of information match your defence strategy to the importance of the information you are protecting expand your defences to include contractors as well as direct employees conduct an effective investigation if a breach occurs create a culture that discourages insider threats including an effective whistleblowing process communicate effectively with the public and stakeholders after a breach occurs Don t make the mistake of investing all your resources and focus into defending against yesterday s attack. This event is Canada s only forum devoted to one of the most important emerging threats to your organization insider threat. Those inside your organization enjoy easier access than those outside and their activities are often harder to detect and defend against. As such they can wreak havock by stealing or destroying your data or stealing your intellectual property and passing it on to competitors. The Snowden case is only the tip of the iceberg. All our organizations are vulnerable either to the lone wolf inside who might act from personal grievance or gain, or maybe worse an insider acting on behalf of a larger group motivated either through money or ideology.
3 Agenda DAY 1 / Wednesday, February 18, 2015 AT A GLANCE 7:45 a.m. Registration and Continental Breakfast 8:15 a.m. Opening Remarks from the Chair 8:45 a.m. Plenary Session 1 10:00 a.m. Networking Break 10:30 a.m. Plenary Session 2 11:30 a.m. Plenary Session 3 12:15 p.m. Networking Luncheon 1:15 p.m. Plenary Session 4 2:00 p.m. Plenary Session 5 2:45 p.m. Refreshment Break 3:00 p.m. Plenary Session 6 3:45 p.m. Plenary Session 7 4:45 p.m. Closing Remarks from the Chair 5:00 p.m. Day 1 Adjourns 7:45 a.m. Registration and Continental Breakfast 8:15 a.m. Opening Remarks from the Chair And Overview of Board Research to Date on Cyber Security and Insider Threat Dr. Satyamoorthy Kabilan, Director, National Security and Strategic Foresight, The Conference Board of Canada 8:45 a.m. Plenary Session 1 Insider Threat Proven Strategies for Identifying and Responding to Potential Threats Dr. Eric Shaw, Consultant, Stroz Friedberg Scott Weber, Managing Director and Leader of the SCOUT Business Unit, Stroz Friedberg Eric Shaw and Scott Weber are two of the top experts in North America on the psychology of insider threats. In this session they will look at the growth vector of insider threats how they get into your organization, how they might become motivated or radicalized before or after joining, the most critical organizational issues that can precipitate dissatisfaction to the point of action. To prevent damage to your organization you need to learn how to be a benign big brother. Their wide-ranging discussion will touch on the most critical issues for HR, IT and leadership in your organization. Among these will be: developing a profile of the archetypal insider threat and using it appropriately understanding behaviours that indicate a possible threat monitoring , texts, etc. and mining this for potential risks but always acting only on behaviour taking an all hazards approach focusing resources understanding whistleblowing policies and the importance of recognizing genuine grievances before they escalate 3
4 DAY 1 / Wednesday, February 18, 2015 using psycholinguistics to determine the credibility of threats how to deal with false positives This extended session offers an outstanding examination of the key challenges posed by insider threats and the latest thinking of those who specialize in helping organizations secure their data from this emerging threat. 10:00 a.m. Networking Break 10:30 a.m. Plenary Session 2 The Insider Threat Malice Not Required Cheri F. McGuire, Vice-President, Global Government Affairs and Cybersecurity Policy, Symantec Corporation In this day and age you need more than a higher and higher wall to defend your organization against cyber threats. In this session, Cheri McGuire of Symantec will challenge your assumptions about what really constitutes an insider threat by exploring some recent, high-profile attacks. Whether caused by a malicious insider or an unwitting employee, the damage from these events is significant and lasting. Cheri will also share her thoughts on how such threats may be recognized and mitigated, and suggest some basic questions every enterprise should be asking about its security. 11:30 a.m. Plenary Session 3 Case Study: One Organization s Response to The Emerging Cyber and Insider Threat Vincent Jarvie, Vice-President, Corporate Security, L-3 Communications Corporation In this session, you will get to hear how one prominent organization is adapting to meet emerging and changing threats. Against a background of growth, increased outsourcing and far greater mobility of employees, L-3 has to stay ever vigilant to prevent data loss or damage to the organization through inside agents. You will hear how L-3 is managing risk in an era of cloud computing, extensive use of contractors, changing technology and growth in attack vectors. 12:15 p.m. Networking Luncheon 4
5 DAY 1 / Wednesday, February 18, :15 p.m. Plenary Session 4 The Accidental Insider: Understanding and Preventing Inadvertent Leaks that Could Damage Your Organization Kevin Ripa, Owner, Computer Evidence Recovery Most of the discussion of insider threat focusses on the malicious employee or contractor who deliberately sets out to do damage to the organization. Whether driven by ideology or disaffection the intent is clear. However insider threats can also be accidental employees who unintentionally release sensitive data to outsiders. This could be a simple as losing a laptop or data stick or posting something on a social media site. In this session, data security expert Kevin Ripa will examine the ways data can be released, the potential consequences based on real life examples, and the steps organizations need to take to prevent incidents. Kevin will cover two critical categories of accidental insider threat: 1. where individuals independently and unintentionally release information 2. where outsiders use insiders and unknowing vectors for attacks This important perspective will ensure that when you develop your strategy to counter insider threat you don t only focus on the malicious but also take into account the capricious. 2:00 p.m. Plenary Session 5 After the Breach I: Conducting Effective and Legal Investigations in Your Workplace Sarah Graves, Partner, Fasken Martineau No matter how well you plan and develop systems to identify and prevent insider threats, you also need to plan what you will do if something goes wrong. 5
6 DAY 1 / Wednesday, February 18, 2015 In this first of two sessions on how best to respond we will look at how to conduct an internal investigation. You need to identify the threat, find out what information he or she has accessed, and what they have done with it. You also need to find out if they were a lone wolf or if there are accomplices or enablers still in your employ. And you need to learn what went wrong and make sure you cover any gaps in your security. But you need to be aware of what you can and can t do the restrictions the law places on you and the kinds of skills you ll need to guide an investigation forward. Questions addressed will include: the roles of HR, in-house counsel, IT and outside experts privacy issues writing an effective report the importance of recent case law common mistakes people make that could derail your investigation 2:45 p.m. Refreshment Break 3:00 p.m. Plenary Session 6 After the Breach II: Protecting Your Organization and It s Reputation Through Effective and Timely Crisis Communications Jason Maloni, Senior Vice-President and Chair, Litigation Practice, LEVICK The threat may be internal but your audience your shareholders, customers, regulators, and the public are external. In the event of a breach you need to move fast to contain damage and protect your brand. This applies whether you are the CIA or the CBC, whether you ve had sensitive information stolen and made public or a rogue employee has acted in ways that damage your reputation. And in the era of social media you can t afford to put a foot wrong otherwise a crisis will quickly become a drama and a drama where your organization and its brand is the villain. Jason Maloni has extensive experience managing crisis communications related to cyber security and insider threat having worked for governments, retailers, banks and in health care. Jason will share this extensive experience with you and help you understand that you need to start now to prepare your crisis communications response you need a team in place ready to respond at a moment s notice because as soon as there is a problem, traditional media will pounce and the public and activist organizations will take to Twitter and other social media platforms and pretty soon they will own the conversation. 6
7 DAY 1 / Wednesday, February 18, :45 p.m. Plenary Session 7 World War III? Inside and Outside Cyber Threats Defining the New World of Threat and Opportunity Dr. James L. Norrie, Dean, Business and Justice Studies, Utica College In this session, James Norrie will discuss some of the existing and emerging cyber threats to organizations in an increasingly global economy. James argues persuasively that not only have companies and governments underestimated the threats they face but they have fundamentally misunderstood the nature of those threats. For too long, organizations have looked at traditional actors with straightforward motivations as the most significant threat often looking only at narrow economic drivers. They also too often presume a level playing field in the global economy putting too much faith in the rule of law. This session will discuss how dangerous these assumptions are. New threats are emerging all the time with many actors now motivated by ideology, not money or simply the desire for anonymous celebrity. In addition, state sponsored entities have become more active with certain states devoting significant resources for apparent third parties to steal data or simply create chaos. Is this a new world war? Maybe, maybe not but the stakes are high, the threats are increasing and they are gathering inside and outside your organization motivated to do you harm. Are you ready? 4:45 p.m. Closing Remarks from the Chair Dr. Satyamoorthy Kabilan, Director, National Security and Strategic Foresight, The Conference Board of Canada 5:00 p.m. Day 1 Adjourns 7
8 Agenda DAY 2 / Thursday, February 19, 2015 AT A GLANCE 7:45 a.m. Continental Breakfast 8:15 a.m. Opening Remarks from the Chair 8:30 a.m. Plenary Session 8 9:30 a.m. Plenary Session 9 10:15 a.m. Refreshment Break 10:30 a.m. Plenary Session 10 11:00 a.m. Plenary Session 11 11:30 a.m. Plenary Session 12 12:15 p.m. Conference Adjourns 7:45 a.m. Continental Breakfast 8:15 a.m. Opening Remarks from the Chair Dr. Satyamoorthy Kabilan, Director, National Security and Strategic Foresight, The Conference Board of Canada 8:30 a.m. Plenary Session 8 Cyber Security Principles for Leaders Fundamentals of a Risk-Aware Organization Kristin Lovejoy, Global General Manager, IBM Security Services, IBM Canada Ltd. Cyber threats have become a key boardroom agenda item and significant technical concern for many organizations today, with the potential to bring down an organization s network, create compliance issues, damage bottom lines, and impact brand reputation. Over 95% of (IT Security) incidents investigated recognize human error as a contributing factor to the threats. And although many organizations invest a significant portion of their operational budget in defending their organization against IT threats, they still find they have cyber security challenges. IBM s Kris Lovejoy has extensive, first-hand experience in this area. Prior to heading IBM s Security Services business, Kris served as IBM s Global Chief Information Security Officer (CISO). In this session, she will provide insights into the major IT threats that organizations face in addressing the growth of cyber incidents and sophisticated attacks, and how organizations can better prepare and defend their critical data and their enterprise. 8
9 DAY 2 / Thursday, February 19, :30 a.m. Plenary Session 9 Responding to Complex New Reality The Emerging Insider Cyber Threat Francis Bradley, Vice-President, Policy Department, Canadian Electricity Association Francis Bradley is responsible for the Canadian Electricity Association s overall policy development and its critical infrastructure protection programs. In this session, Francis will discuss how electricity generators, transmitters and distributors are responding to an increasingly threatening environment. His talk will cover issues such as: how risks have increased in the last decade increasing threat vectors how increasing interconnectedness translates into increased risk the need for greater collaboration between organizations understanding the complexity created by increased use of contractors broadening your horizons to include critical suppliers and service providers 10:15 a.m. Refreshment Break 10:30 a.m. Plenary Session 10 Insider Threat and Cybersecurity: The RCMP Perspective Michel Aubin, Director General, CISC, Royal Canadian Mounted Police The RCMP is responsible for large amounts of confidential and sensitive information both its own and as custodian for other police forces across the country. To protect this information from theft or malicious damage the RCMP has increased its focus on insider threats - both in regards to accidental release and where outside organizations recruit insiders to steal data. In short there are many people and organizations who want to know what the RCMP knows about them and their activities. And in many cases protection of this information is a matter of life and death. In this session, Michel Aubin will discuss the extent of the problem and its recent growth and how the threat is changing. He will discuss the relative importance of the threat and how this determines the resources available to address it. He will also discuss how the RCMP is collaborating with other forces to ensure greater security of data across the country. 9
10 DAY 2 / Thursday, February 19, :00 a.m. Plenary Session 11 Industry, Government, and Academia Collaborating to Create a Secure Canada Dr. Tony J. Bailetti, Director, Technology Innovation Management, Carleton University and Executive Director (Acting), VENUS Cybersecurity Corporation, Carleton University In an environment of escalating cyber threats it is clear that there needs to be greater cooperation between sectors in order to ensure Canada could become a leader in cybersecurity. As a result, VENUS Cybersecurity Corporation was established. VENUS is an independent not-for-profit that provides the people, space, and infrastructure to work on complex, leading-edge cybersecurity problems affecting individuals, businesses, and governments throughout the world. In this session, you will hear about the environment that makes VENUS necessary, the progress made to date, its activities including research and education, and its vision for a cybersecurity ecossystem that supports the innovation of Canadians addressing this vital issue. 11:30 a.m. Plenary Session 12 Closing Session and Remarks from the Chair Dr. Satyamoorthy Kabilan, Director, National Security and Strategic Foresight, The Conference Board of Canada This closing session will both summarize some of the key lessons learned during the event and cast an eye on the future. Central to this discussion will be an exploration of the gaps many organizations have when it comes to addressing insider and cyber threats, both those that exist today and those that might develop in the future. This will lead into an introduction and launch of the Board s new Centre for Cyber Security and invitation for delegates to suggest areas of study. 12:15 p.m. Conference Adjourns 10
11 Registration REGISTER NOW! or Register now and save! Individual Rates Before Dec. 18, 2014 Before Jan. 19, 2015 After Jan. 19, 2015 Regular Rate $1,355 $1,455 $1,555 Promotional Rate $1,155 $1,155 $1,155 Conference Board Executive Network Rate $778 $778 $778 Your registration in this event includes the sessions, continental breakfasts, breaks, luncheon, and a link to speaker presentations. TO REGISTER Online Fax PDF form to Phone or All registrations will be confirmed. Program subject to change. Events are HST exempt. Please see for our cancellation policy. CONFERENCE VENUE Shaw Centre (formerly the Ottawa Convention Centre) 55 Colonel By Dr, Ottawa ON K1N 9J2 HOTEL ACCOMMODATIONS The Westin Ottawa 11 Colonel By Dr, Ottawa ON K1N 9H4 Tel Conference fees don t include accommodations. Please contact the hotel directly for reservations, and mention The Conference Board of Canada to receive the preferred rate of $179, available until Jan. 12, Should you need to cancel your reservation, you must do so 72 hours prior to arrival to avoid penalty of one night room and tax. SPECIAL OFFERS 4-for-the-price-of-3 team offer! Visit or call to find out more. Network Members save on registration! Members of The Conference Board of Canada executive networks save 50% off registration for all upcoming conferences! For details, contact ext. 236 or [email protected]. Earn Directors College Continuing Professional Development (CPD) Hours! Conference Board of Canada conferences contribute to Continuing Professional Development (CPD) hours for Directors College, Chartered Directors. For more information on CPD requirements and criteria visit The Conference Board s Privacy Policy By registering for this event, you are giving us consent to use information you provided to help us inform you about additional Conference Board products and services. To view our Privacy Policy, visit If you wish to withdraw your consent to our use of your infor mation, contact us at [email protected] or
12 Registration Form Cyber Security and Insider Threat: Effective Strategies for Defending Your Data and Organization FEBRUARY 18 19, 2015 OTTAWA Group rates are available See for details. YES! Please register the following delegate for this event Name Title Organization Tel. Fax Mailing Address City Province Postal Code Your registration in this event includes the sessions, continental breakfasts, breaks, luncheon, and a link to speaker presentations. Fees Before Dec. 18, 2014 Before Jan. 19, 2015 After Jan. 19, 2015 Regular Rate $1,355 $1,455 $1,555 Please confirm attendance at event functions: Day 1 Networking Luncheon: Payment method: (all fees are due by the event date) Credit card (we will you a link to our secure system for payment) Cheque (payable to The Conference Board of Canada ) The Conference Board of Canada 255 Smyth Road, Ottawa ON K1H 8M7 All registrations will be confirmed. Program subject to change. Events are HST exempt. Please see for our cancellation policy. this form to: [email protected], or fax to:
13 Sponsors We d like to thank our generous sponsors for their contribution to this event. MARKETING PARTNERS SPECIAL CONTRIBUTOR Connect with your top prospects! Sponsor this event, and collaborate with senior executives, practitioners, and thought leaders. Connect your brand with the solutions, and position your organization as a leader in its field. To learn more about sponsor benefits, contact Rhonda Bradbury at or [email protected].
14 Insights. Understanding. Impact. 255 Smyth Road, Ottawa ON K1H 8M7 Canada Tel Fax Inquiries conferenceboard.ca
A Day at the Ontario Teachers Pension Plan
SUMMIT AGENDA APRIL 28, 2014 TORONTO TIME FOR ACTION Pension Summit 2014. Derek W. Dobson Chief Executive Officer and Plan Manager, CAAT Pension Plan Jennifer Gregory Vice-President, Business Development,
Benefits and Disability Management 2015.
CONFERENCE AGENDA OCTOBER 20 21, 2015 TORONTO FROM RESEARCH TO ACTION Benefits and Disability Management 2015. Ann Dowsett Johnston Expert on Public Policy & Addiction, Author of Drink: The Intimate Relationship
Cyber Security Strategy
NEW ZEALAND S Cyber Security Strategy 2015 A secure, resilient and prosperous online New Zealand Ministerial Foreword The internet and technology have become a fundamental element in our lives. We use
KEY ISSUES IN PRIVACY AND INFORMATION MANAGEMENT
OSGOODE PROFESSIONAL DEVELOPMENT The OsgoodePD Webinar Series KEY ISSUES IN PRIVACY AND INFORMATION MANAGEMENT 8 focused webinars for the latest legal developments, including: Session 1: September 16,
www.pwc.com Developing a robust cyber security governance framework 16 April 2015
www.pwc.com Developing a robust cyber security governance framework 16 April 2015 Cyber attacks are ubiquitous Anonymous hacker group declares cyber war on Hong Kong government, police - SCMP, 2 October
Aftermath of a Data Breach Study
Aftermath of a Data Breach Study Sponsored by Experian Data Breach Resolution Independently conducted by Ponemon Institute LLC Publication Date: January 2012 Ponemon Institute Research Report Aftermath
October 24, 2014. Mitigating Legal and Business Risks of Cyber Breaches
October 24, 2014 Mitigating Legal and Business Risks of Cyber Breaches AGENDA Introductions Cyber Threat Landscape Cyber Risk Mitigation Strategies 1 Introductions 2 Introductions To Be Confirmed Title
Mitigating and managing cyber risk: ten issues to consider
Mitigating and managing cyber risk: ten issues to consider The board of directors is responsible for managing and mitigating risk exposure. A recent study conducted by the Ponemon Institute 1 revealed
How To Protect Your Organization From Insider Threats
Research Conducted by 2015 VORMETRIC INSIDER THREAT REPORT Trends and Future Directions in Data Security FINANCIAL SERVICES EDITION #2015InsiderThreat RESEARCH BRIEF US FINANCIAL SERVICES SPOTLIGHT ABOUT
WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY
SMALL BUSINESSES WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY ONE CLICK CAN CHANGE EVERYTHING SMALL BUSINESSES My reputation was ruined by malicious emails ONE CLICK CAN CHANGE EVERYTHING Cybercrime comes
ACE European Risk Briefing 2012
#5 ACE European Risk Briefing 2012 IT and cyber risk respondent profiles The research was carried out between 13 April and 3 May 2012. The sample comprised 606 European risk managers, CROs, CFOs, COOs
Seamless Mobile Security for Network Operators. Build a secure foundation for winning new wireless services revenue.
Seamless Mobile Security for Network Operators Build a secure foundation for winning new wireless services revenue. New wireless services drive revenues. Faced with the dual challenges of increasing revenues
Cyber Security - What Would a Breach Really Mean for your Business?
Cyber Security - What Would a Breach Really Mean for your Business? August 2014 v1.0 As the internet has become increasingly important across every aspect of business, the risks posed by breaches to cyber
Cyber security: it s not just about technology
Cyber security: it s not just about technology The five most common mistakes kpmg.com b Cyber security: it s not just about technology Contents Preface 1 01 Understanding the cyber risk 3 02 The five most
Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft
Cyber Security and Privacy Services Working in partnership with you to protect your organisation from cyber security threats and data theft 2 Cyber Security and Privacy Services What drives your security
www.pwc.co.uk Cyber security Building confidence in your digital future
www.pwc.co.uk Cyber security Building confidence in your digital future November 2013 Contents 1 Confidence in your digital future 2 Our point of view 3 Building confidence 4 Our services Confidence in
Course 4202: Fraud Awareness and Cyber Security Workshop (3 days)
Course introduction It is vital to ensure that your business is protected against the threats of fraud and cyber crime and that operational risk processes are in place. This three-day course provides an
February 24-26, 2016 Westin Hotel Ottawa, ON
February 24-26, 2016 Westin Hotel Ottawa, ON INTRODUCTION The Canadian Nuclear Association Conference and Trade Show is the annual nuclear industry showcase. The theme of the 2016 Canadian Nuclear Association
Change Management 2016.
CONFERENCE AGENDA MAY 4 5, 2016 TORONTO DIGITAL, DISRUPTIVE & DISPERSED CHANGE Change Management 2016. Irene Andress Chief Nursing Executive, Program Director ER/ Medicine/Nursing Resource Team Toronto
Nine Steps to Smart Security for Small Businesses
Nine Steps to Smart Security for Small Businesses by David Lacey Co-Founder, Jericho Forum Courtesy of TABLE OF CONTENTS INTRODUCTION... 1 WHY SHOULD I BOTHER?... 1 AREN T FIREWALLS AND ANTI-VIRUS ENOUGH?...
Financial Implications of Cybercrime Meeting the Information Security Management Challenge in the Cyber-Age
Financial Implications of Cybercrime Meeting the Information Security Management Challenge in the Cyber-Age Southern California Association for Financial Professionals February 14, 2014 Stan Stahl, Ph.D.
Big 4 Information Security Forum
San Francisco ISACA Chapter Proudly Presents: Big 4 Information Security Forum A Day-Long, Multi-Session Event, being held in San Francisco @ the Sir Francis Drake Hotel! *** PLEASE NOTE THIS EVENT WILL
Ten Questions Your Board Should be asking about Cyber Security. Eric M. Wright, Shareholder
Ten Questions Your Board Should be asking about Cyber Security Eric M. Wright, Shareholder Eric Wright, CPA, CITP Started my career with Schneider Downs in 1983. Responsible for all IT audit and system
GALLAGHER CYBER LIABILITY PRACTICE. Tailored Solutions for Cyber Liability and Professional Liability
GALLAGHER CYBER LIABILITY PRACTICE Tailored Solutions for Cyber Liability and Professional Liability Are you exposed to cyber risk? Like nearly every other business, you have probably capitalized on the
Into the cybersecurity breach
Into the cybersecurity breach Tim Sanouvong State Sector Cyber Risk Services Deloitte & Touche LLP April 3, 2015 Agenda Setting the stage Cyber risks in state governments Cyber attack vectors Preparing
CYBER SECURITY, A GROWING CIO PRIORITY
www.wipro.com CYBER SECURITY, A GROWING CIO PRIORITY Bivin John Verghese, Practitioner - Managed Security Services, Wipro Ltd. Contents 03 ------------------------------------- Abstract 03 -------------------------------------
The Directors Cut. The power of data: What directors need to know about Big Data, analytics and the evolution of information. www.pwc.
www.pwc.com/ca/acconnect The Directors Cut The power of data: What directors need to know about Big Data, analytics and the evolution of information December 201 This newsletter is brought to you by PwC
Cyber Risk & Insurance
Cyber Risk & Insurance The Risk Managers Forum Thursday 27 November 2014 One-day conference Grange City Hotel, 8-14 Cooper s Row, London EC3N 2QB Event sponsor Headline sponsor Cyber Risk & Insurance The
The Project Management Course Using Microsoft Project Workshop
The Project Management Course Using Microsoft Project Workshop Study practical and effective management techniques for the successful execution of any project. The Project Management 3-day course teaches
Cyber-Security. FAS Annual Conference September 12, 2014
Cyber-Security FAS Annual Conference September 12, 2014 Maysar Al-Samadi Vice President, Professional Standards IIROC Cyber-Security IIROC Rule 17.16 BCP The regulatory landscape Canadian Government policy
CYBER SECURITY Cyber Security for Canadian Directors in the Wake of Ashley Madison
CYBER SECURITY Cyber Security for Canadian Directors in the Wake of Ashley Madison Gary Solway* Bennett Jones LLP The August release of the purported names and other details of over 35 million customers
Odgers Berndtson Board Survey. Among CEOs in Denmark s largest corporations
Boards and CEOs preparing for growth Almost half of the CEOs in Denmark s largest corporations consider the financial crisis to be over and expect positive growth in the near future. This calls for preparation
JOB ANNOUNCEMENT. Chief Security Officer, Cheniere Energy, Inc.
JOB ANNOUNCEMENT Chief Security Officer, Cheniere Energy, Inc. Position Overview The Vice President and Chief Security Risk Officer (CSRO) reports to the Chairman, Chief Executive Officer and President
Cyber security Time for a new paradigm. Stéphane Hurtaud Partner Information & Technology Risk Deloitte
Cyber security Time for a new paradigm Stéphane Hurtaud Partner Information & Technology Risk Deloitte 90 More than ever, cyberspace is a land of opportunity but also a dangerous world. As public and private
Is Your Company Ready for a Big Data Breach? Sponsored by Experian Data Breach Resolution
Is Your Company Ready for a Big Data Breach? Sponsored by Experian Data Breach Resolution Independently conducted by Ponemon Institute LLC Publication Date: April 2013 Ponemon Institute Research Report
Cyber Security for audit committees
AUDIT COMMITTEE INSTITUTE Cyber Security for audit committees An introduction kpmg.com/globalaci 2 Audit Committee Institute An introduction to cyber security for audit committees Audit committees have
Cyber Security: Confronting the Threat
09 Cyber Security: Confronting the Threat Cyber Security: Confronting the Threat 09 In Short Cyber Threat Awareness and Preparedness Active Testing Likelihood of Attack Privacy Breaches 9% 67% Only 9%
IDENTITY THEFT AND DATA BREACH CONFERENCE 2016
IDENTITY THEFT AND DATA BREACH CONFERENCE 2016 Day 1 Thursday January 28, 2016 INTERNATIONAL DATA PRIVACY DAY 7:30am 8:30am Registration 8:30am 9:00am Opening Remarks Conference Chair Kevin M. Scott, President
CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility
CYBER SECURITY AND RISK MANAGEMENT An Executive level responsibility Cyberspace poses risks as well as opportunities Cyber security risks are a constantly evolving threat to an organisation s ability to
Testimony of Matthew Rhoades Director Cyberspace & Security Program Truman National Security Project & Center for National Policy
Testimony of Matthew Rhoades Director Cyberspace & Security Program Truman National Security Project & Center for National Policy House Committee on Homeland Security Subcommittee on Cybersecurity, Infrastructure
Small businesses: What you need to know about cyber security
Small businesses: What you need to know about cyber security March 2015 Contents page What you need to know about cyber security... 3 Why you need to know about cyber security... 4 Getting the basics right...
Information Security Awareness Training and Phishing
Information Security Awareness Training and Phishing Audit Report Report Number IT-AR-16-001 October 5, 2015 Highlights The Postal Service s information security awareness training related to phishing
The Software Supply Chain Integrity Framework. Defining Risks and Responsibilities for Securing Software in the Global Supply Chain.
The Software Supply Chain Integrity Framework Defining Risks and Responsibilities for Securing Software in the Global Supply Chain July 21, 2009 Editor Stacy Simpson, SAFECode Contributors Dan Reddy, EMC
THE CHANGING FACE OF IDENTITY THEFT THE CURRENT AND FUTURE LANDSCAPE
THE CHANGING FACE OF IDENTITY THEFT THE CURRENT AND FUTURE LANDSCAPE Identity is the unique set of characteristics that define an entity or individual. Identity theft is the unauthorized use of an individual
Cyber Threat Intelligence Move to an intelligencedriven cybersecurity model
Cyber Threat Intelligence Move to an intelligencedriven cybersecurity model Stéphane Hurtaud Partner Governance Risk & Compliance Deloitte Laurent De La Vaissière Director Governance Risk & Compliance
Stay ahead of insiderthreats with predictive,intelligent security
Stay ahead of insiderthreats with predictive,intelligent security Sarah Cucuz [email protected] IBM Security White Paper Executive Summary Stay ahead of insider threats with predictive, intelligent
February 24-26, 2016 Westin Hotel Ottawa, ON
February 24-26, 2016 Westin Hotel Ottawa, ON SPONSORSHIP OPPORTUNITIES available sold LEVEL OPPORTUNITY MEMBER VALUE SPONSOR URANIUM Opening Reception $100,000 sold PLATINUM Thursday Lunch $50,000 available
www.pwc.fi We believe successful global organisations can confront fraud, corruption and abuse PwC Finland Forensic Services
www.pwc.fi We believe successful global organisations can confront fraud, corruption and abuse Finland Who are we? Bring a robust forensics team to the table to support your organisation Our practice can
How to Respond When Sensitive Customer and Employee Data is Breached, Stolen or Compromised
ACE USA Podcast Released June 24, 2010 How to Respond When Sensitive Customer and Employee Data is Breached, Stolen or Compromised Moderator: Richard Tallo Senior Vice President, ACE North America Marketing
Data Security: Fight Insider Threats & Protect Your Sensitive Data
Data Security: Fight Insider Threats & Protect Your Sensitive Data Marco Ercolani Agenda Data is challenging to secure A look at security incidents Cost of a Data Breach Data Governance and Security Understand
WHITE PAPER KEEPING CLIENT AND EMPLOYEE DATA SECURE DRIVES REVENUE AND BUILDS TRUST PROTECTING THE PROTECTOR
KEEPING CLIENT AND EMPLOYEE DATA SECURE DRIVES REVENUE AND BUILDS TRUST Protecting Identities. Enhancing Reputations. IDT911 1 DATA BREACHES AND SUBSEQUENT IDENTITY THEFT AND FRAUD THREATEN YOUR ORGANIZATION
DISCOVER, MONITOR AND PROTECT YOUR SENSITIVE INFORMATION Symantec Data Loss Prevention. symantec.com
DISCOVER, MONITOR AND PROTECT YOUR SENSITIVE INFORMATION Symantec Data Loss Prevention symantec.com One of the interesting things we ve found is that a lot of the activity you d expect to be malicious
Cyber Risk and Insurance What companies need to know
Supported by The Security Institute Cyber Risk and Insurance What companies need to know Organised by Produced by Central London Supported by About the Conference Who should attend Estimates as to the
Cyber security: Are consumer companies up to the challenge?
Cyber security: Are consumer companies up to the challenge? 1 Cyber security: Are consumer companies up to the challenge? A survey of webcast participants kpmg.com 1 Cyber security: Are consumer companies
GAO. INFORMATION SECURITY Persistent Weaknesses Highlight Need for Further Improvement
GAO For Release on Delivery Expected at time 1:00 p.m. EDT Thursday, April 19, 2007 United States Government Accountability Office Testimony Before the Subcommittee on Emerging Threats, Cybersecurity,
Cybersecurity: Considerations for Internal Audit. IIA Atlanta Chapter Meeting January 9, 2015
Cybersecurity: Considerations for Internal Audit IIA Atlanta Chapter Meeting January 9, 2015 Agenda Key Risks Incorporating Internal Audit Resources for Internal Auditors Questions 2 Key Risks 3 4 Key
Cyber Defence Capability Assessment Tool (CDCAT ) Improving cyber security preparedness through risk and vulnerability analysis
Cyber Defence Capability Assessment Tool (CDCAT ) Improving cyber security preparedness through risk and vulnerability analysis An analogue approach to a digital world What foundations is CDCAT built on?
The Project Management Course for Health Care Using Microsoft Project Workshop
in association with Upcoming Sessions: Course: November 5-7, 2012 Workshop: November 8-9, 2012 HLLN.ca/project-management The Project Management Course for Health Care Using Microsoft Project Workshop
Cybersecurity and internal audit. August 15, 2014
Cybersecurity and internal audit August 15, 2014 arket insights: what we are seeing so far? 60% of organizations see increased risk from using social networking, cloud computing and personal mobile devices
THE HUMAN COMPONENT OF CYBER SECURITY
cybersecurity.thalesgroup.com.au People, with their preference to minimise their own inconvenience, their predictability, apathy and general naivety about the potential impacts of their actions, are the
Remarks by. Thomas J. Curry. Comptroller of the Currency. Before the. Chicago. November 7, 2014
Remarks by Thomas J. Curry Comptroller of the Currency Before the 10 th Annual Community Bankers Symposium Chicago November 7, 2014 Good morning, it s a pleasure to be here today and to have this opportunity
Small businesses: What you need to know about cyber security
Small businesses: What you need to know about cyber security Contents Why you need to know about cyber security... 3 Understanding the risks to your business... 4 How you can manage the risks... 5 Planning
2015: Time to. Rethink Enterprise IT Security. 2015 Black Hat Attendee Survey. Download. Subscribe. Previous. Next. Next. Previous. Next.
blackhat.com July 2015 2015 Black Hat Attendee Survey 2015: Time to Rethink Enterprise IT Security In first-ever survey, sophisticated security professionals say enterprise security priorities don t address
Dealing with risk. Why is risk management important?
Why is risk management important? Things don t always go according to plan: a company s sales manager changes employment in the middle of an important project, a packaging machine breaks down, a lathe
Executive Summary 3. Snowden and Retail Breaches Influencing Security Strategies 3. Attackers are on the Inside Protect Your Privileges 3
GLOBAL ADVANCED THREAT LANDSCAPE SURVEY 2014 TABLE OF CONTENTS Executive Summary 3 Snowden and Retail Breaches Influencing Security Strategies 3 Attackers are on the Inside Protect Your Privileges 3 Third-Party
Defending yesterday. Financial Services. Key findings from The Global State of Information Security Survey 2014
www.pwc.com/security Defending yesterday While organizations have made significant security improvements, they have not kept pace with today s determined adversaries. As a result, many rely on yesterday
2015 NETWORK SECURITY & CYBER RISK MANAGEMENT: THE FOURTH ANNUAL SURVEY OF ENTERPRISE-WIDE CYBER RISK MANAGEMENT PRACTICES IN EUROPE
2015 NETWORK SECURITY & CYBER RISK MANAGEMENT: THE FOURTH ANNUAL SURVEY OF ENTERPRISE-WIDE CYBER RISK MANAGEMENT PRACTICES IN EUROPE February 2015 2015 Network Security & Cyber Risk Management: The FOURTH
Internet threats: steps to security for your small business
Internet threats: 7 steps to security for your small business Proactive solutions for small businesses A restaurant offers free WiFi to its patrons. The controller of an accounting firm receives a confidential
How To Protect Your Data From Theft
Understanding the Effectiveness of a Data Protection Program IIA: Almost Free Seminar 21 June 2011 Agenda Data protection overview Case studies Ernst & Young s point of view Understanding the effectiveness
Application Security in the Software Development Lifecycle
Application Security in the Software Development Lifecycle Issues, Challenges and Solutions www.quotium.com 1/15 Table of Contents EXECUTIVE SUMMARY... 3 INTRODUCTION... 4 IMPACT OF SECURITY BREACHES TO
a new approach to IT security
REPRINT FEBRUARY 2013 healthcare financial management association hfma.org a new approach to IT security FEATURE STORY REPRINT FEBRUARY 2013 healthcare financial management association hfma.org a new approach
Top 10 Tips to Keep Your Small Business Safe
Securing Your Web World Top 10 Tips to Keep Your Small Business Safe Protecting your business against the latest Web threats has become an incredibly complicated task. The consequences of external attacks,
Cyber Security in the Financial Industry
Supported by Cyber Security in the Financial Industry The SWIFT Institute and the KU Leuven will host a one day conference focusing on cyber security issues impacting the global financial industry. Today
CIVIL SEXUAL ASSAULT CLAIMS
OSGOODE PROFESSIONAL DEVELOPMENT The OsgoodePD Webinar Series THE GUIDE TO BRINGING/DEFENDING CIVIL SEXUAL ASSAULT CLAIMS 7 webinars that will equip you with up-to-date information and best practices for
CLOSING THE DOOR TO CYBER ATTACKS HOW ENTERPRISES CAN IMPLEMENT COMPREHENSIVE INFORMATION SECURITY
CLOSING THE DOOR TO CYBER ATTACKS HOW ENTERPRISES CAN IMPLEMENT COMPREHENSIVE INFORMATION SECURITY CLOSING THE DOOR TO CYBER ATTACKS Cybersecurity and information security have become key challenges for
